Risk Management Lead

Accenture Federal ServicesArlington, VA
11h

About The Position

As the Risk Management Lead, you're responsible for providing comprehensive cybersecurity authorization and accreditation services in support of the Risk Management Framework (RMF) process for systems, networks, and applications. This role involves collaborating with system owners, cybersecurity teams, and technical teams to advance through the six steps of the RMF process, developing security plans, generating assessment reports, and formulating remediation plans. The Cybersecurity Manager ensures compliance with policies and procedures by categorizing information systems, selecting and implementing security controls, producing necessary artifacts, assessing security controls, monitoring security states, and documenting all relevant RMF data in approved repositories such as eMASS.

Requirements

  • Bachelor's degree (or equivalent work experience) in Cybersecurity, Information Technology, or a related field
  • 10 years of experience in cybersecurity NIST CSF
  • Experience with the Risk Management Framework (RMF) process
  • Extensive knowledge of cybersecurity policies and procedures, and demonstrate proficiency in developing security plans, generating assessment reports, and formulating remediation plans
  • Experience leading a team of ten or more
  • Any of the following certifications: SecurityX / CASP+, CGRC/CAP, CISSO, Cloud+, FITSP-A, GCSA, GSEC, PenTest+, Security+
  • Must have an active Secret clearance

Nice To Haves

  • One or more of the following certifications CISSP, CISM, or CCISO, CySA+

Responsibilities

  • providing comprehensive cybersecurity authorization and accreditation services in support of the Risk Management Framework (RMF) process for systems, networks, and applications
  • collaborating with system owners, cybersecurity teams, and technical teams to advance through the six steps of the RMF process
  • developing security plans
  • generating assessment reports
  • formulating remediation plans
  • ensuring compliance with policies and procedures by categorizing information systems
  • selecting and implementing security controls
  • producing necessary artifacts
  • assessing security controls
  • monitoring security states
  • documenting all relevant RMF data in approved repositories such as eMASS
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service